Hacking: Hacking: How to Hack, Penetration Testing Hacking Book, Step-By-Step Implementation and Demonstration Guide Learn Fast (Paperback)
            
暫譯: 駭客技術:駭客入門、滲透測試駭客書籍、逐步實作與示範指南,快速學習(平裝本)
        
        Alex Wagner
- 出版商: CreateSpace Independ
 - 出版日期: 2017-11-12
 - 售價: $1,310
 - 貴賓價: 9.5 折 $1,245
 - 語言: 英文
 - 頁數: 584
 - 裝訂: Paperback
 - ISBN: 1979683239
 - ISBN-13: 9781979683234
 - 
    相關分類:
    
      Penetration-test、駭客 Hack
 
無法訂購
買這商品的人也買了...
- 
                
                  
                  
                深入淺出 Python (Head First Python)$780$616 - 
                
                  
                  
                $1,365Systems Performance: Enterprise and the Cloud (Paperback) - 
                
                  
                  
                跟我學 Excel VBA-將複雜的操作用一個按鍵就搞定!(適用2013/2010/2007)$450$356 - 
                
                  
                  
                anidees 黑色鋁製外殼(B+ / Pi 2 / Pi3 適用)$1,200$1,140 - 
                
                  
                  
                Node.js 模組參考手冊$580$458 - 
                
                  
                  
                精通 Python|運用簡單的套件進行現代運算 (Introducing Python: Modern Computing in Simple Packages)$780$616 - 
                
                  最新行銷王 - Facebook 廣告沒有說的業績倍增活用術
$350$273 - 
                
                  
                  
                Swift - AR 擴增實境與感應器開發$480$408 - 
                
                  
                  
                TensorFlow + Keras 深度學習人工智慧實務應用$590$460 - 
                
                  
                  
                CentOS 7.3 建置、管理與伺服器架設實戰$580$452 - 
                
                  
                  
                寫程式前就該懂的演算法 ─ 資料分析與程式設計人員必學的邏輯思考術 (Grokking Algorithms: An illustrated guide for programmers and other curious people)$390$308 - 
                
                  
                  
                Python 架站特訓班 -- Django 最強實戰$450$356 - 
                
                  
                  
                Python:期貨演算法交易實務 121個關鍵技巧詳解$500$390 - 
                
                  
                  
                輕課程 遇見 micro:bit 用 JavaScript Blocks 積木玩轉新世界$150$135 - 
                
                  
                  
                輕課程 micro:bit 微型電腦帶著走:使用 Python 輕鬆玩$150$135 - 
                
                  
                  
                演算法圖鑑:26種演算法 + 7種資料結構,人工智慧、數據分析、邏輯思考的原理和應用 step by step 全圖解$450$356 - 
                
                  
                  
                為你自己學 Git$500$425 - 
                
                  
                  
                Arduino 軟硬體協調設計開發聖經$490$417 - 
                
                  
                  
                Python 入門邁向高手之路王者歸來$699$594 - 
                
                  
                  
                彼得潘的 Swift 程式設計入門$450$356 - 
                
                  
                  
                Powershell: The ultimate beginner’s guide to Powershell, making you a master at Windows Powershell command line fast!$525$515 - 
                
                  
                  
                How Cybersecurity Really Works: A Hands-On Guide for Total Beginners (Paperback)$1,470$1,397 - 
                
                  
                  
                電腦網路原理, 6/e (含ITS Networking 網路管理與應用國際認證模擬試題)$360$284 - 
                
                  
                  
                2024 新趨勢計算機概論 (適合資管、商管學群)$580$458 - 
                
                  
                  
                Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World (Paperback)$1,558$1,476 
商品描述
HACKING - 5 BOOKS IN 1
- The history of hacking, What motivates Hackers, and how to differentiate one to another
 - Networking fundamentals, and basic system requirements
 - Where to find the best operating systems for the purpose of Hacking
 - What virtualization is, and how to install Hacking software
 
Penetrating Wired Networks
- Exploiting systems in multiple ways,
 - Implementing Man in the Middle attack in multiple ways,
 - How to use Social Engineering Toolkits,
 - Creating a fake packet and find vulnerabilities,
 - How to manipulate the network
 
Wireless Hacking
- How to own adevice connected remotely
 - How to find hidden wireless networks, How to implement a Rouge Wireless Access Point
 - Discovering networking devices through wireless
 - Exploiting systems in multiple ways using wireless technologies
 - Implementing Man in the Middle attack in multiple ways, How to become a wireless access point using your laptop
 
Hacking Attacks
- ADVWARE
 - SPYWARE
 - MALWARE
 - MAN IN THE MIDDLE
 - LOCKY
 - TRAFFIC REDIRECTION
 - PAYLOAD INJECTION
 - ARP POISIONING
 - WORMS
 - DE-AUTHENTICATION ATTACKS
 - COLLISION ATTACKS
 - REPLAY ATTACKS
 - PHISHING
 - VISHING
 - WHALING
 - SMISHING
 - SPEAR PHISHING
 - DUMPSTER DIVING
 - SHOULDER SURFING
 - BRUTE FORCE ATTACK
 - DICTIONARY ATTACKS
 - RAINBOW TABLES
 - KEYSTROKE LOGGINGS
 - SPOOFINS
 - SOCIAL ENGINEERING
 - SPAMMING
 - SQL INJECTIONS
 - DDOS ATTACKS
 - TCP SYN FLOOD ATTACK
 - PING OF DEATH
 - VIRUSES
 - ROOTKITS
 - LOGIC BOMBS
 - TROJAN HORSES
 - WANNAYCRY RANSOMWARE
 - BOTNETS
 
CyberGangs
- Cutting sword of justice,
 - Guardians of Peace,
 - Honker Union,
 - Anonymous
 - Syrian Electronic Army,
 - LulzSec,
 - Carbanac,
 - Equation Group,
 - The Shadow Brokers
 
商品描述(中文翻譯)
**駭客技術 - 5 本書合一**
**書籍 1: 初學者指南**
**書籍 2: 無線駭客技術**
**書籍 3: 每位駭客必備的 17 種工具**
**書籍 4: 17 種最危險的駭客攻擊**
**書籍 5: 10 大最危險的網路黑幫**
-------------------------------------------
在本書中,您將學習到:
-------------------------------------------
**基本知識**
- 駭客的歷史、駭客的動機,以及如何區分不同的駭客
- 網路基礎知識及基本系統需求
- 如何找到最適合駭客用途的作業系統
- 什麼是虛擬化,以及如何安裝駭客軟體
**滲透有線網路**
- 以多種方式利用系統
- 以多種方式實施中間人攻擊
- 如何使用社交工程工具包
- 創建假封包並尋找漏洞
- 如何操控網路
**無線駭客技術**
- 如何控制遠端連接的設備
- 如何找到隱藏的無線網路,如何實施惡意無線接入點
- 通過無線發現網路設備
- 使用無線技術以多種方式利用系統
- 以多種方式實施中間人攻擊,如何使用筆記型電腦成為無線接入點
**駭客攻擊**
- ADVWARE
- SPYWARE
- MALWARE
- MAN IN THE MIDDLE
- LOCKY
- TRAFFIC REDIRECTION
- PAYLOAD INJECTION
- ARP POISONING
- WORMS
- DE-AUTHENTICATION ATTACKS
- COLLISION ATTACKS
- REPLAY ATTACKS
- PHISHING
- VISHING
- WHALING
- SMISHING
- SPEAR PHISHING
- DUMPSTER DIVING
- SHOULDER SURFING
- BRUTE FORCE ATTACK
- DICTIONARY ATTACKS
- RAINBOW TABLES
- KEYSTROKE LOGGINGS
- SPOOFING
- SOCIAL ENGINEERING
- SPAMMING
- SQL INJECTIONS
- DDOS ATTACKS
- TCP SYN FLOOD ATTACK
- PING OF DEATH
- VIRUSES
- ROOTKITS
- LOGIC BOMBS
- TROJAN HORSES
- WANNACRY RANSOMWARE
- BOTNETS
**網路黑幫**
- 正義之劍
- 和平守護者
- 鳴響聯盟
- 匿名者
- 敘利亞電子軍
- LulzSec
- Carbanac
- Equation Group
- The Shadow Brokers
